检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn

不再显示此消息

  • Intl-English
    International
    • English
    • Bahasa Indonesia
    • Español
    • Português
    • Türkçe
    • عربي
    • ไทย
    • 简体中文
    • 日本語
    中国站
    • 简体中文
    Europe
    • English
    • Deutsch
    • Español
    • Français
    • Nederlands
  • Huawei Cloud
    • Activities
    • Products
    • Solutions
    • Pricing
    • KooGallery
    • Partners
    • Developers
    • Support
    • About Us
    Hot
    • Free Packages
    • Elastic Cloud Server (ECS)
    • Object Storage Service (OBS)
    • ModelArts
    • Cloud Container Engine (CCE)
      Show more results for “”
      • Contact Us
      • Documentation
      • Console
        • My Account
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Sign In Sign Up
      • Sign In
      • Sign Up
        • My Account Complete Sign Up
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Log Out
      Cancel
      Hot
      • Free Packages
      • Elastic Cloud Server (ECS)
      • Object Storage Service (OBS)
      • ModelArts
      • Cloud Container Engine (CCE)
        • All
        • Products
        • Solutions
        • Documentation
        • KooGallery
        • Developer
        • Learn
        • Others
        576 results found.
        • Performing a Server-Side Encryption - Relational Database Service

          Performing a Server-Side Encryption - Relational Database Service

          Encrypting Disks Using Server-Side Encryption For server-side encryption, you need to first create a key using Data Encryption Workshop (DEW) or use the default key that DEW comes with. When creating a DB instance, select Enable for disk encryption and select or create a key.

          Help > Relational Database Service > User Guide > Working with RDS for MySQL > Security and Encryption
        • Performing a Server-Side Encryption - Relational Database Service-RDS for MySQL

          Performing a Server-Side Encryption - Relational Database Service-RDS for MySQL

          Encrypting Disks Using Server-Side Encryption For server-side encryption, you need to first create a key using Data Encryption Workshop (DEW) or use the default key that DEW comes with. When creating a DB instance, select Enable for disk encryption and select or create a key.

          Help > User Guide > Security and Encryption
        • Performing a Server-Side Encryption - Relational Database Service-RDS for PostgreSQL

          Performing a Server-Side Encryption - Relational Database Service-RDS for PostgreSQL

          Encrypting Disks Using Server-Side Encryption For server-side encryption, you need to first create a key using Data Encryption Workshop (DEW) or use the default key that DEW comes with. When creating a DB instance, select Enable for disk encryption and select or create a key.

          Help > User Guide > Security and Encryption
        • Connection Methods - GaussDB

          Connection Methods - GaussDB

          Some performance overhead may be added, especially when it is used for encrypting and decrypting large amounts of data. It applies to environments that require high data transmission security, such as finance and healthcare industries.

          Help > GaussDB > Developer Guide(Centralized_V2.0-2.x) > Application Development Guide > Development Based on JDBC > Development Process > Connecting to a Database
        • How Do I Use a DEK? - Data Encryption Workshop

          How Do I Use a DEK? - Data Encryption Workshop

          Encrypting Data with a DEK KMS does not support data encryption with DEKs. You can use other encryption libraries (for example, OpenSSL) to encrypt data with DEKs. Obtain a plaintext DEK by referring to Creating a DEK. Use the plaintext DEK to encrypt data.

          Help > Data Encryption Workshop > FAQs > KMS Related
        • Notes and Constraints - Image Management Service

          Notes and Constraints - Image Management Service

          The key used for encrypting an image cannot be changed. Deleting images Private image status A private image published to KooGallery cannot be deleted.

          Help > Image Management Service > Service Overview
        • Uploading an Object - Resumable (SDK for Go) - Object Storage Service

          Uploading an Object - Resumable (SDK for Go) - Object Storage Service

          parameter Explanation: Key for encrypting the object when SSE-C is used Restrictions: The value is a Base64-encoded 256-bit key, for example, K7QkYpBkM5+hca27fsNkUnNVaobncnLht/rCB2o/9Cw=.

          Help > Object Storage Service > Go > Objects (SDK for Go) > Object Upload Overview (SDK for Go)
        • FAQ - KooGallery

          FAQ - KooGallery

          If they are the same, check whether the encryptType parameter for encrypting and decrypting sensitive information is correctly transferred to KooGallery. If the algorithm is AES256_CBC_PKCS5Padding, the value must be 1.

          Help > KooGallery > Access Guide > SaaS Access Guide V1.0 (Deprecated)
        • Checking Whether an Object Exists (SDK for Java) - Object Storage Service

          Checking Whether an Object Exists (SDK for Java) - Object Storage Service

          Default value: None sseCKey byte[] Yes Explanation: Key used for encrypting the object when SSE-C is used, in byte[] format. Default value: None sseCKeyBase64 String No Explanation: Base64-encoded key used for encrypting the object when SSE-C is used.

          Help > Object Storage Service > Java > Object Management (SDK for Java)
        • Managing Encrypted Disks - Dedicated Distributed Storage Service

          Managing Encrypted Disks - Dedicated Distributed Storage Service

          For details, see Encrypting an Image in the Image Management Service User Guide. The encryption attribute of an existing disk cannot be changed. You can create new disks and determine whether to encrypt the disks or not.

          Help > Dedicated Distributed Storage Service > User Guide > Disk Management
        • How Do I Access or Download an Encrypted Object? - Object Storage Service

          How Do I Access or Download an Encrypted Object? - Object Storage Service

          Encrypting an Object Method 1: Enable server-side encryption when you create a bucket. Then, all types of objects uploaded to the bucket will be automatically encrypted with the encryption method and key you specified during bucket creation.

          Help > Object Storage Service > FAQs > Server-Side Encryption
        • Downloading an Object - Streaming (SDK for Go) - Object Storage Service

          Downloading an Object - Streaming (SDK for Go) - Object Storage Service

          parameter Explanation: Key for encrypting the object when SSE-C is used Restrictions: The value is a Base64-encoded 256-bit key, for example, K7QkYpBkM5+hca27fsNkUnNVaobncnLht/rCB2o/9Cw=.

          Help > Object Storage Service > Go > Objects (SDK for Go) > Object Download Overview (SDK for Go)
        • Processing an Image (SDK for Go) - Object Storage Service

          Processing an Image (SDK for Go) - Object Storage Service

          parameter Explanation: Key for encrypting the object when SSE-C is used Restrictions: The value is a Base64-encoded 256-bit key, for example, K7QkYpBkM5+hca27fsNkUnNVaobncnLht/rCB2o/9Cw=.

          Help > Object Storage Service > Go > Objects (SDK for Go)
        • Copying a Part (SDK for Python) - Object Storage Service

          Copying a Part (SDK for Python) - Object Storage Service

          Default value: None sseKms str Explanation: SSE-KMS is used for encrypting objects on the server side.

          Help > Object Storage Service > Python > APIs Related to Multipart Upload (SDK for Python)
        • Basic Concepts - Data Encryption Workshop

          Basic Concepts - Data Encryption Workshop

          Envelope Encryption Envelope encryption is the practice of encrypting data with a DEK and then encrypting the DEK with a root key that you can fully manage. In this case, CMKs are not required for encryption or decryption. DEK A data encryption key (DEK) is used to encrypt data.

          Help > Data Encryption Workshop > Service Overview
        • Instance Query - KooGallery

          Instance Query - KooGallery

          For details about the example code, see ISV Server Encrypting the Username and Password After Resource Enabling. memo No String 1,024 Remarks. The following table describes the UsageInfo data structure.

          Help > KooGallery > Access Guide > SaaS Access Guide V1.0 (Deprecated) > Interface Description
        • Encryption Key Management - Data Encryption Workshop

          Encryption Key Management - Data Encryption Workshop

          Generating a random number POST /v1.0/{project_id}/kms/gen-random kms:cmk:generate - √ × Creating a DEK POST /v1.0/{project_id}/kms/create-datakey kms:dek:create - √ √ Creating a plaintext-free DEK POST /v1.0/{project_id}/kms/create-datakey-without-plaintext kms:dek:create - √ √ Encrypting

          Help > Data Encryption Workshop > API Reference > Permissions Policies and Supported Actions
        • Best Practices - Application Performance Management

          Best Practices - Application Performance Management

          Encrypting AK/SK for Deploying an APM Agent in a CCE Container Encrypt the AK/SK when deploying an APM Agent on CCE. Suggestions on APM Security Configuration This document provides guidance for enhancing the overall security of APM.

          Help > Application Performance Management > Best Practices(2.0)
        • Connection Methods - GaussDB

          Connection Methods - GaussDB

          Some performance overhead may be added, especially when it is used for encrypting and decrypting large amounts of data. It applies to environments that require high data transmission security, such as finance and healthcare industries.

          Help > GaussDB > Developer Guide(Distributed_V2.0-8.x) > Application Development Guide > Development Based on JDBC > Development Process > Connecting to a Database
        • Delegating Another Service for Resource Management - Identity and Access Management

          Delegating Another Service for Resource Management - Identity and Access Management

          With the agency, SFS can obtain KMS keys for encrypting or decrypting file systems. You can view the agency in the agency list on the IAM console. Creating a Cloud Service Agency on the IAM Console Log in to the IAM console.

          Help > Identity and Access Management > User Guide > Agency Management
        Total results: 576
        • Previous
        • 1
        • ...
        • 6
        • 7
        • 8
        • ...
        • 29
        • Next
        • Go
        Load More
        Was this helpful?
        Feedbacks
        /200
        Submit Feedback Cancel
        Contact Sales After-Sales Self Service
        • Site Terms
        • Privacy Statement

        Explore Huawei Cloud

        Why Us Customer Stories Trust Center Legal Press Releases

        Featured Services

        Elastic Cloud Server (ECS) Elastic IP (EIP) RDS for MySQL Elastic Volume Service (EVS) MapReduce Service (MRS)

        Service and Support

        Documentation Contact Us Public Notices Support Plans Service Health Dashboard

        Account and Payment

        Top Up Invoices Billing Center My Account Payment Method

        Quick Links

        Huawei Corporate Huawei Enterprise Huawei Consumer Business Huawei Developers

        © 2025, Huawei Cloud Computing Technologies Co., Ltd. and/or its affiliates. All rights reserved.

        • Site Terms
        • Privacy Statement